This is a dedicated watch page for a single video.
Roberto has discovered the username for an application in his target's environment. As he has limited amount of time, he decides to attempt to use a list of common passwords he found on the internet. He compiles them into a list and then feeds that list as an argument into his password cracking application. What type of attack is Roberto performing?